Preferred Language
Articles
/
NxaEuocBVTCNdQwCsl_g
Managing sensitive data in cloud computing for effective information systems’ decisions

Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Scopus (3)
Scopus
Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
A Comparison of Different Estimation Methods to Handle Missing Data in Explanatory Variables

Missing data is one of the problems that may occur in regression models. This problem is usually handled by deletion mechanism available in statistical software. This method reduces statistical inference values because deletion affects sample size. In this paper, Expectation Maximization algorithm (EM), Multicycle-Expectation-Conditional Maximization algorithm (MC-ECM), Expectation-Conditional Maximization Either (ECME), and Recurrent Neural Networks (RNN) are used to estimate multiple regression models when explanatory variables have some missing values. Experimental dataset were generated using Visual Basic programming language with missing values of explanatory variables according to a missing mechanism at random general pattern and s

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Efficient Cloud-Based Resource Sharing Through Multi-Tenancy and Load Balancing: An Exploration of Higher Education and Digital Libraries

      Cloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Detection and Mitigation of Cache Pollution Attack Using Popularity Variation in Information Centric Networking Based on SDN

      Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me

... Show More
Scopus Crossref
View Publication
Publication Date
Sun Nov 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Application of Discrete Logarithms in Information - Hiding and Knapsack Problem with New Properties of Sk-Sets

Discrete   logarithms  are applied      in many    cryptographic problems  . For instance ,   in public   key .  and for construction of sets with disti nct sums of  k-clcments.  The   purpose o r  this   paper

is  to  modify  the  method ol' informationl1·iding  using        discrete logarithms  , introduce new properties of St - sets ,   uscdthe direct product   of    groups   to construct  cyclic group and finally, present modified   method   for   knapsack &

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Axiology of Electronic programs in updating the methodology of information and communication sciences Tropes 8.4 Case Study

The study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of international evaluation standards (IVS) in enhancing the quality of financial reporting (appropriate accounting information(

The research aims to introduce international valuation standards and to identify the relationship between international valuation standards and international accounting and financial reporting standards in enhancing the quality of financial reporting (appropriate accounting information) through the use of statistical models for the purpose of measuring the property of appropriateness of accounting information through the use of statistical models for the purpose of proving the hypothesis that The research referred to it, and accordingly, the Francis and Kothari models were used to measure the appropriateness of accounting information (the quality of the information). The conclusions reached by the two researchers is that the sett

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
A Numerical Study for Solving the Systems of Fuzzy Fredholm Integral Equations of the Second Kind Using the Adomian Decomposition Method

     In this paper, the Adomian decomposition method (ADM) is successfully applied to find the approximate solutions for the system of fuzzy Fredholm integral equations (SFFIEs) and we also study the convergence of the technique. A consistent way to reduce the size of the computation is given to reach the exact solution. One of the best methods adopted to determine the behavior of the approximate solutions. Finally, the problems that have been addressed confirm the validity of the method  applied in this research using a comparison by combining numerical methods such as the Trapezoidal rule and Simpson rule with ADM.

Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
The Existence of a Polynomial Inverse Integrating Factors and Studies About the Limit Cycles for Cubic, Quartic and Quintic Polynomial Systems

Scopus (1)
Scopus Clarivate Crossref
View Publication Preview PDF